Choose your Bitcoin wallet

Bitcoin Core

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet is a full node that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Complete transparency

This wallet is open-source and built deterministically. This means any developer in the world can audit the code and make sure the final software isn't hiding any secrets.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Core is a full Bitcoin client and builds the backbone of the network. It offers high levels of security, privacy, and stability. However, it has fewer features and it takes a lot of space and memory.

MultiBit

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

MultiBit is a lightweight client that focuses on being fast and easy to use. It synchronizes with the network and is ready to use in minutes. MultiBit also supports many languages. It is a good choice for non-technical users.

Armory

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Armory is an advanced Bitcoin client that expands its features for Bitcoin power users. It offers many backup and encryption features, and it allows secure cold-storage on offline computers.

Electrum

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and random servers from a list. This means little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Electrum's focus is speed and simplicity, with low resource usage. It uses remote servers that handle the most complicated parts of the Bitcoin system, and it allows you to recover your wallet from a secret phrase.

mSIGNA

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

Airbitz Bitcoin Wallet

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

breadwallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Simplicity is breadwallet's core design principle. As a real standalone Bitcoin client, there is no server to get hacked or go down, and by building on iOS's strong security base, breadwallet is designed to protect you from malware, browser security holes, even physical theft.

TREZOR

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

TREZOR is a hardware wallet providing a high level of security without sacrificing convenience. Unlike cold storage, TREZOR is able to sign transactions while connected to an online device. That means spending bitcoins is secure even when using a compromised computer.

Ledger HW.1

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

HW.1 is a hardware wallet built upon a ST23YT66 banking smartcard platform. It keeps the user private keys safe, validates transactions, can be used as a secure prepaid card or a multisignature party. While not open-source, it can be deterministically validated.

Hive

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

Mycelium

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Mycelium Bitcoin Wallet is an open source wallet for Android designed for security, speed, and ease of use. It has unique features to manage your keys and for cold storage that help you secure your bitcoins.

BitGo

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

BitGo is a multi-signature wallet offering a high level of security. Every transaction requires two signatures, protecting your bitcoins from malware and server attacks. Private keys are held by the user such that BitGo cannot access the bitcoins. It is a good choice for non technical users.

GreenAddress

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

Coinbase

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinbase is a web wallet service that aims to be easy to use. It also provides an Android web wallet app, merchant tools and integration with US bank accounts to buy and sell bitcoins.

Coinkite

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinkite is a web wallet & debit card service that aims to be easy to use. It also works on mobile browsers, has merchant tools, point-of-sale payment terminals. It is a hybrid wallet and full reserve vault.

Xapo

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Xapo combines the convenience of an everyday Bitcoin wallet with the security of an insured deep cold storage vault. Xapo Debit Card links to your Xapo Wallet and allows you to spend bitcoins at millions of merchants all around the world.

Circle

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Circle is a web wallet service that aims to be easy to use. It provides the ability to instantly purchase and sell bitcoins using either a credit card or a U.S. bank account. It also provides an Android and an iOS web wallet app.

Bitcoin Core

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet is a full node that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Complete transparency

This wallet is open-source and built deterministically. This means any developer in the world can audit the code and make sure the final software isn't hiding any secrets.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Core is a full Bitcoin client and builds the backbone of the network. It offers high levels of security, privacy, and stability. However, it has fewer features and it takes a lot of space and memory.

MultiBit

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

MultiBit is a lightweight client that focuses on being fast and easy to use. It synchronizes with the network and is ready to use in minutes. MultiBit also supports many languages. It is a good choice for non-technical users.

Armory

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Armory is an advanced Bitcoin client that expands its features for Bitcoin power users. It offers many backup and encryption features, and it allows secure cold-storage on offline computers.

Electrum

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and random servers from a list. This means little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Electrum's focus is speed and simplicity, with low resource usage. It uses remote servers that handle the most complicated parts of the Bitcoin system, and it allows you to recover your wallet from a secret phrase.

mSIGNA

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Full validation

This wallet requires you to install full node software that validates and relays transactions on the Bitcoin network. This means no trust in a third party is required when verifying payments. Full nodes provide the highest level of security and are essential to protecting the network. However, they require more space (over 20GB), bandwidth, and a longer initial synchronization time.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Improved privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Avoids disclosing information

This wallet does not disclose information to peers on the network when receiving or sending a payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

Bitcoin Wallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

Bitcoin Wallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Bitcoin Wallet is easy to use and reliable, while also being secure and fast. Its vision is de-centralization and zero trust; no central service is needed for Bitcoin-related operations. The app is a good choice for non-technical people.

Airbitz Bitcoin Wallet

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

Airbitz Bitcoin Wallet

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

Airbitz Bitcoin Wallet

This wallet gives you control over your bitcoins. However, this service is retaining an encrypted copy of your wallet. This means your bitcoins can be stolen if you don't use a strong password and the service is compromised.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Airbitz is a mobile Bitcoin Wallet making high levels of privacy, security, and decentralization very familiar and usable to the masses. Airbitz wallets are always automatically encrypted, backed up, and even function when Airbitz servers go down.

breadwallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Simplicity is breadwallet's core design principle. As a real standalone Bitcoin client, there is no server to get hacked or go down, and by building on iOS's strong security base, breadwallet is designed to protect you from malware, browser security holes, even physical theft.

breadwallet

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Simplicity is breadwallet's core design principle. As a real standalone Bitcoin client, there is no server to get hacked or go down, and by building on iOS's strong security base, breadwallet is designed to protect you from malware, browser security holes, even physical theft.

TREZOR

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

TREZOR is a hardware wallet providing a high level of security without sacrificing convenience. Unlike cold storage, TREZOR is able to sign transactions while connected to an online device. That means spending bitcoins is secure even when using a compromised computer.

Ledger HW.1

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Variable validation

Payment validation features are provided by the software wallet you use with this device. Please see the Validation score for the software wallet you plan to use.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Very secure environment

This wallet is loaded from a secure specialized environment provided by the device. This provides very strong protection against computer vulnerabilities and malware since no software can be installed on this environment.

Variable privacy

Privacy features are provided by the software wallet you use with this device. Please see the Privacy score for the software wallet you plan to use.

HW.1 is a hardware wallet built upon a ST23YT66 banking smartcard platform. It keeps the user private keys safe, validates transactions, can be used as a secure prepaid card or a multisignature party. While not open-source, it can be deterministically validated.

Hive

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

Hive

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

Hive

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

New app

This wallet has not been tested and publicly reviewed by a significant number of people. This means this app might be more at risk of hiding dangerous code or doing something you wouldn't agree to.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

Hive

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Simplified validation

This wallet uses SPV and the Bitcoin network. This means very little trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Weak privacy

Allows spying on your payments

This wallet makes it easy for anyone to spy on your balance and payments because it reuses the same addresses.

Discloses limited information to peers

Peers on the network can log your IP address and associate your payments together when receiving or sending payment.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a fast, integrated, user-friendly Bitcoin wallet for Mac OS X. With a focus on usability, Hive is translated into many languages and has apps, making it easy to interact with your favorite Bitcoin services and merchants.

Hive

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Hive is a human-friendly Bitcoin and Litecoin wallet, which features a beautiful, elegant and simple interface. It offers Waggle, a simple way to send & receive tokens with other Hive users near you. Your passphrase generates your wallet, making it portable and backups easy.

Mycelium

This wallet gives you full control over your bitcoins. This means no third party can freeze or lose your funds. You are however still responsible for securing and backing up your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Secure environment

This wallet is loaded on mobiles where apps are usually isolated. This provides a good protection against malware, although mobiles are usually easier to steal or lose. Encrypting your mobile and backing up your wallet can reduce that risk.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This wallet uses central servers which are able to associate your payments together and log your IP address.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Mycelium Bitcoin Wallet is an open source wallet for Android designed for security, speed, and ease of use. It has unique features to manage your keys and for cold storage that help you secure your bitcoins.

BitGo

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

BitGo is a multi-signature wallet offering a high level of security. Every transaction requires two signatures, protecting your bitcoins from malware and server attacks. Private keys are held by the user such that BitGo cannot access the bitcoins. It is a good choice for non technical users.

GreenAddress

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

GreenAddress

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

GreenAddress

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

GreenAddress

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

GreenAddress

This wallet requires every transaction to be authorized both by you and this third party. Under normal circumstances, you can regain full control over your bitcoins using your initial backup or pre-signed transactions sent by email.

Decentralized validation

This wallet connects to a random server from a list. This means some trust in third parties is required when verifying payments. However, it is not as secure as a full node like Bitcoin Core.

Basic transparency

The developers of this wallet publish the source code for the client. This means any developer in the world can audit the code. However, you still need to trust developers of this wallet when installing or updating the final software because it was not built deterministically like Bitcoin Core.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor not supported

This wallet does not let you use Tor to prevent attackers or Internet service providers from associating your payments with your IP address.

GreenAddress is a user-friendly multi-signature wallet with improved security and privacy. At no time are your keys server side, even encrypted. For security reasons, you should always use 2FA and the browser extension or Android App.

Coinbase

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinbase is a web wallet service that aims to be easy to use. It also provides an Android web wallet app, merchant tools and integration with US bank accounts to buy and sell bitcoins.

Coinkite

This service has full control over your bitcoins. This means you need to trust this service will not lose your funds in an incident on their side. As of today, most web wallets don't insure their deposits like a bank, and many such services have suffered from security breaches in the past.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Coinkite is a web wallet & debit card service that aims to be easy to use. It also works on mobile browsers, has merchant tools, point-of-sale payment terminals. It is a hybrid wallet and full reserve vault.

Xapo

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Vulnerable environment

This wallet can be loaded on computers which are vulnerable to malware. Securing your computer, using a strong passphrase, moving most of your funds to cold storage or enabling two-factor authentication can make it harder to steal on your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Xapo combines the convenience of an everyday Bitcoin wallet with the security of an insured deep cold storage vault. Xapo Debit Card links to your Xapo Wallet and allows you to spend bitcoins at millions of merchants all around the world.

Circle

This service has full control over your bitcoins. This means you need to trust this service will not freeze or mismanage your funds. Although this service claims to be providing insurance against failures on their side, you are still responsible for securing your wallet.

Centralized validation

This wallet relies on a centralized service by default. This means a third party must be trusted to not hide or simulate payments.

Remote app

This wallet is loaded from a remote location. This means that whenever you use your wallet, you need to trust the developers not to steal or lose your bitcoins in an incident on their site. Using a browser extension or mobile app, if available, can reduce that risk.

Two-factor authentication

This wallet can be used from insecure environments. However, this service requires two-factor authentication. This means access to multiple devices or accounts is required to steal your bitcoins.

Basic privacy

Prevents spying on your payments

This wallet makes it harder to spy on your balance and payments by rotating addresses. You should still take care to use a new Bitcoin address each time you request payment.

Discloses information to a third party

This service can associate your payments together, log your IP address and know your real identity if you provide personal information like your email, name or banking account.

Tor can be used

This wallet lets you setup and use Tor as a proxy to prevent attackers or Internet service providers from associating your payments with your IP address.

Circle is a web wallet service that aims to be easy to use. It provides the ability to instantly purchase and sell bitcoins using either a credit card or a U.S. bank account. It also provides an Android and an iOS web wallet app.

Take time to educate yourself

Bitcoin is different from what you know and use every day. Before you start using Bitcoin for any serious transaction, be sure to read what you need to know and take appropriate steps to secure your wallet. Always remember that it is your responsibility to choose your wallet carefully and adopt good practices in order to protect your money.